Off-site Backup to a NAS Device Using BackupAssist (Synology Example)

BackupAssist Synology WebDAV setup

In case you missed the announcement, BackupAssist recently added WebDAV to the suite of backup job types the software is able to support. Intended for those who wish to back up their data to an off-site destination, the protocol enables admins to create encrypted, incremental backups to either a third party hosting company, another Windows server or a NAS device.

The latter is a popular choice, particularly for the smaller business. They’re a good option because once the hardware’s paid for, there’s no monthly recurring charge as you’d tend to expect from a cloud storage provider. Also, the portability of the small units means they can be ‘seeded’ to locally and then moved. In most cases, you have physical access too, which means you’re not relying on an Internet connection for your data in disaster recovery scenarios

In this post, I focus on the steps for configuring one of the more common NAS devices I come into contact with, the Synology. The requirements will be the same for other brands, however, the exact steps and screenshots will of course differ. Continue reading

Why You Need A Password Manager (like 1Password)

Alright, so it’s time to log in to that site you’ve not used in a while. 

Username and password? Yep, no problem…

‘Login unsuccessful’

Blast.

….okay, what about B1ngoWozH1sNamo21?

‘Login unsuccessful’

Blast.

It’s a familiar tale in this wonderful digital age in which we live – we’re surrounded by a bottomless pool of amazing websites and services, all climbing over one another to improve our lives, however, every one of the darned things requires a registration.

Continue reading

Backing Up To Microsoft Azure Using BackupAssist

It’s been a couple of months since we announced the launch of BackupAssist v10 and its super efficient new cloud backup engine. The significance of the new engine is that it unlocks the possibility of using public cloud giants AWS and Azure as backup destination options.

While the BackupAssist side of things is typically easy to configure, I’ve had a few requests for help navigating Azure’s configuration options, so in this article, I’ll be walking through the steps as they are today.

Continue reading

Protecting Against Ransomware – An MDaemon Admin’s Guide

Unless you’ve somehow managed to avoid both the news headlines and the barrage of content from IT security vendors that followed, you’ll no doubt be aware that a couple of weeks ago, there was a particularly severe ransomware attack that affected over 100,000 businesses around the globe, including the NHS.

The latest evidence indicates that the recent ‘WannaCry’ attack originated via an exploit tool created by the NSA, however it’s more common they originate via ‘phishing’ emails, the technique of tricking recipients into clicking a malicious link or opening an attachment, often appearing to be from a colleague or relative.

So with this in mind, now seems like a great time to give you a refresher on the features at your disposal as an MDaemon administrator to help prevent the type of phishing attack that can lead to a ransomware infection, along with some additional tips on best practice.

(Almost all of the security tools for MDaemon are in the SecurityPlus add-on so for the purpose of this post, I’ll be assuming you’ve got that installed.)

Continue reading

How To Set Up Email Reporting In MailStore Server

Set up reporting in MailStore

Last week we let you know about the release of MailStore v10.1, the centrepiece of which was a simple but useful feature we’ve been asked for quite a bit – scheduled email reporting.

You may be thinking, MailStore is German so there won’t be any issues to report on!? Well, not everything about your email is under MailStore’s control, so as an administrator, it’s still nice to see confirmation that your ‘Enten in einer Reihe’ occasionally.

In this blog post, I’ll show you how to enable the delightful HTML report email, and let you know how to get the most from it.

Continue reading

How to Analyse MDaemon Logs Using Microsoft Excel

blog-md-excel-700x353

A popular feature of MDaemon is its ability to let administrators quickly pinpoint message activity and session information using detailed logs. Sometimes, however, what’s required is more an overview of server usage such as how load is being shared across users or mailboxes for example.

In this post I take a look at how you can use Microsoft Excel to query data you may not even be aware is available in MDaemon!

Continue reading

How to check if somebody knows your password. Have you been ‘pwned’?

If you read my post on ‘spear phishing’  you’ll be aware that the hijacking of email accounts is on the rise. These attacks generally revolve around the attacker already knowing the login details for the account somehow.

When I speak to customers they often wonder how the attacker knew their seemingly complex password. Did they simply guess it?

The simple answer is no, in my opinion, that’s very unlikely.

It’s much more likely that the email address and password were used on another site/ service which has led to them being compromised or ‘pwned’.

Continue reading